Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

How to Mitigate Privileged User Attacks

Red Canary via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn how to protect against evolving threats targeting developers and privileged users in this 34-minute cybersecurity webinar featuring Justin Steven from Tanto Security. Discover critical vulnerabilities in common software development tools like Visual Studio Code and understand why developers need to maintain strong operational security practices. Explore the significant risks posed by unverified software and examine non-technical solutions for validating user identities. Master essential security strategies including environment isolation techniques and implementation of time-bounded credentials to enhance your organization's security posture. Gain practical insights into recognizing attack vectors that specifically target privileged users and development environments. Understand the importance of maintaining security awareness throughout the software development lifecycle and learn actionable practices that development teams can implement immediately to reduce their attack surface.

Syllabus

How to mitigate privileged user attacks

Taught by

Red Canary

Reviews

Start your review of How to Mitigate Privileged User Attacks

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.